{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:59:36Z","timestamp":1759147176882,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208877"},{"type":"electronic","value":"9783540398813"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39881-3_21","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T22:14:04Z","timestamp":1277331244000},"page":"237-252","source":"Crossref","is-referenced-by-count":25,"title":["Enlisting Hardware Architecture to Thwart Malicious Code Injection"],"prefix":"10.1007","author":[{"given":"Ruby B.","family":"Lee","sequence":"first","affiliation":[]},{"given":"David K.","family":"Karig","sequence":"additional","affiliation":[]},{"given":"John P.","family":"McGregor","sequence":"additional","affiliation":[]},{"given":"Zhijie","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Baratloo, A., Singh, N., Tsai, T.: Transparent Run-time Defense against Stack Smashing Attacks. In: Proc. of the 9th USENIX Security Symposium (June 2000)"},{"key":"21_CR2","unstructured":"Bypassing StackGuard and StackShield. Phrack Magazine\u00a010(56) (May 2000)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Burger, D., Austin, T.M.: The SimpleScalar Tool Set, Version 2.0. University of Wisconsin-Madison Computer Sciences Department Technical Report (1342) (June 1997)","DOI":"10.1145\/268806.268810"},{"key":"21_CR4","unstructured":"CERT Coordination Center (November 2001), http:\/\/www.cert.org\/"},{"key":"21_CR5","unstructured":"Compaq Computer Corporation, Alpha 21164 Microprocessor (.28\u03bcm): Hardware Reference Manual (December 1998)"},{"key":"21_CR6","unstructured":"Compaq Computer Corporation, Alpha 21264 Microprocessor Hardware Reference Manual (July 1999)"},{"key":"21_CR7","unstructured":"Cormie, D.: The ARM11 Microarchitecture (April 2002), available at http:\/\/www.arm.com\/support\/WhitePapers\/"},{"key":"21_CR8","unstructured":"Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th USENIX Security Symposium (January 1998)"},{"key":"21_CR9","unstructured":"Frantzen, M., Shuey, M.: StackGhost: Hardware Facilitated Stack Protection. In: Proceedings of the 10th USENIX Security Symposium (August. 2001)"},{"key":"21_CR10","unstructured":"Hornof, L., Jim, T.: Certifying Compilation and Run-time Code Generation. In: Proceedings of the ACM Conference on Partial Evaluation and Semantics-Based Program Manipulation (January 1999)"},{"key":"21_CR11","unstructured":"Houle, K.J., Weaver, G.M., Long, N., Thomas, R.: Trends in Denial of Service Attack Technology. CERT Coordination Center (October 2001)"},{"key":"21_CR12","unstructured":"Intel Corporation, The IA-32 Intel Architecture Software Developer\u2019s Manual, vol. 2: Instruction Set Reference, Intel Corporation (2001)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kaeli, D.R., Emma, P.G.: Branch History Table Prediction of Moving Target Branches Due to Subroutine Returns. In: Proceedings of the 18th International Symposium on Computer Architecture, May 1991, pp. 34-41 (1991)","DOI":"10.1145\/115952.115957"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Karger, P.A., Schell, R.R.: Thirty Years Later: Lessons from the Multics Security Evaluation. In: Proceedings of the 2002 Annual Computer Security Applications Conference, December 2002, pp. 119-126 (2002)","DOI":"10.1109\/CSAC.2002.1176285"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of the Tenth International Conference on World Wide Web, April 2001, pp. 514-525 (2001)","DOI":"10.1145\/371920.372148"},{"key":"21_CR16","unstructured":"Karig, D., Lee, R.B.: Remote Denial of Service Attacks and Countermeasures. Princeton University Department of Electrical Engineering Technical Report CEL2001-002 (October 2001)"},{"key":"21_CR17","unstructured":"klog: The Frame Pointer Overwrite. Phrack Magazine 9(55) (September 1999)"},{"issue":"1","key":"21_CR18","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/2.19825","volume":"22","author":"R.B. Lee","year":"1989","unstructured":"Lee, R.B.: Precision Architecture. IEEE Computer\u00a022(1), 78\u201391 (1989)","journal-title":"IEEE Computer"},{"key":"21_CR19","unstructured":"McCarthy, J.: Take Two Aspirin, and Patch That System \u2013 Now. SecurityWatch, August 31 (2001)"},{"key":"21_CR20","unstructured":"The SANS Institute, The SANS\/FBI Twenty Most Critical Internet Security Vulnerabilities (October 2002), http:\/\/www.sans.org\/top20\/"},{"key":"21_CR21","unstructured":"The Standard Performance Evaluation Corporation (November 2001), http:\/\/www.spec.org\/"},{"key":"21_CR22","unstructured":"Viega, J., Bloch, J.T., Kohno, T., McGraw, G.: ITS4: A Static Vulnerability Scanner for C and C++ Code. In: Proceedings of the 2000 Annual Computer Security Applications Conference (December 2000)"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 156-169 (2001)","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"21_CR24","unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In: Network and Distributed System Security Symposium (February 2000)"},{"key":"21_CR25","unstructured":"Webb, C.F.: Subroutine Call\/Return Stack. IBM Technical Disclosure Bulletin 30(11) (April 1988)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39881-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T06:01:47Z","timestamp":1740204107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-39881-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208877","9783540398813"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39881-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}